REMME

Securing access of digital identities

REMME is the Distributed Public Key Infrastructure protocol with a set of DApps for Access Management. 65% of confirmed data breaches involve weak, default, or stolen passwords and cybercrime costs the global economy around $400 billion annually. REMME is building the distributed Public Key Infrastructure (PKI) solution, which prevents phishing, server and password breach, and utilize SSL/TLS protocol to protect the entire channel from attack. The REM token powers all operations within the ecosystem including certificate generation, revocation, and rewarding of nodes which safeguard the network.

About REMME

The primary means of accessing various local and network resources today is via password, a method that has proven itself as a way of identifying and securing users and resources. However, it has one serious drawback: in the event of a password being stolen, the attacker gains access to all of the account-holder’s data. Moreover, because users often deploy the same password for multiple services, the situation is exacerbated, while weak passwords can be a subject to vocabulary attack. Password databases from a variety of resources periodically fall into open access, exposing hundreds of millions of passwords to hackers.

Even where the affected user has the ability to change their password, their account is still vulnerable, since the user's mailboxes are usually protected by a password that is often the same as that used on other resources. Thus, passwords cannot serve as a sufficient instrument for protecting user data and guaranteeing the security of the user session.

REMME solves the following issues:

Trusting the centralized certification authority (CA)

CA keys being compromised

Fake certificate issuance

Issuance of "hidden" certificates, trying to intercept and redirect connections

This allows complete and transparent control and tracking of all issued certificates, no possibility for issuing "hidden" certificates, and eliminated attempts to intercept and redirect connections.

Various parties (including Google) have tried to solve those issues, but without success. Blockchain systems ensure the immutability of data stored within them, providing an effective and practical solution.

Finally, a quality technical project aimed at the user!
Immediately obvious that the guys from the cyber security industry, and the great fellows that so well implemented blockchain technology and tokenization concept. Good luck!

Experts are independently and voluntarily contributing to the community. If no expert has rated the ICO, only ICO analyzer's results are used. Always research before investing as these ratings should not be taken as an investing guide of any kind.

Ratings and ICO analyzer results are being updated (re-calculated) every few hours.

- Public testing. At this stage a user can nominate themselves to become a holder of a master node, which will be processed by the existing master nodes and, if the user is eligible by all criteria, they will be included in the list of approved nodes. At this stage, thanks to further development of PoA, master nodes from the list of approved nodes will be added periodically by REMME maintainers. Prices will be updated in a centralized manner (see “Pricing policy”) from a REMME maintainer’s trusted node. New prices will take their place after 10 confirmation of the block they were introduced in. By this stage, the system will also have cross-blockchain token transfers so that everyone who purchased REMME
tokens will be able to take full advantage of the service.
- REMME Core integration with Active Directory and SCADA systems.
- Extending of decentralized ecosystem of nodes.
- Product security audits and pen-tests.
- Opening sales office in London: hiring dedicated sales responsible for EU, extending existing marketing team and hiring support team.
- 50+ integrations.

9

Q4, 2018

- At this stage the release of the public system is planned, so the process of master node management on the public service will be fully automatic without involving REMME maintainers.
- The consensus algorithm update is also planned. Master nodes are ranked according to their performance and stability of operation (or uptime) every n seconds. When a new block appears (every m seconds), the pseudorandom algorithm selects one of the nodes in proportion to its rank (the higher the rank the higher the possibility for the node to be selected), and the system waits for the block signed by this node to appear. If the selected node does not produce a new block for more than k seconds, the algorithm automatically proceeds to the next node. In this way, the system ensures maximum adherence to the specified parameters and motivates the master nodes to remain in the system.
- Building DApps for IoT on top of REMME Core (with a focus on automotive and smart cities).
- Product security audits and pen-tests.
- Opening sales office in New York: hiring dedicated sales team responsible for US, extending existing marketing team and hiring support team.
- 100+ integrations.

10

Q1, 2019

- Opening sales offices in Tokyo and Singapore: hiring dedicated sales teams responsible for Asian market, extending existing marketing team and hiring support team for the region.
- Holding special cybersecurity events once every 3 months.
- Special cybersecurity lessons and classes in Ukraine for training specialists to contribute to the REMME ecosystem.